Search for person "David Kang"
prev
next
21 min
A collection of network configuration libraries
46 min
Strong metadata protection for asynchronous messaging
58 min
Wer denkt, Vorratsdatenspeicherungen und „Big Data“ sind…
61 min
Tamper Proofing Commodity Hardware and other Applications
58 min
An inside look at x86 CPU design
52 min
"A copier's output equals its input." You think that's…
prev
next